A node of a network for managing an intrusion protection system, the node comprising a memory module for storing data in machine-readable format for retrieval and execution by a central processing unit and an operating system comprising a network stack comprising a protocol driver and a media access control driver and operable to execute an intrusion protection system management application, the management application operable to receive text-file input from an input device, the text-file defining a network-exploit rule and comprising at least one field is provided. A method of distributing command and security updates in a network having an intrusion protection system comprising generating a text-file defining a network-exploit rule and specifying at least one field selected from the group consisting of an ENABLED field value and a SEVERITY level field value during generation of the text-file is provided. A computer-readable medium having stored thereon a set of instructions to be executed, the set of instructions, when executed by a processor, cause the processor to perform a computer method of reading input from an input device of the computer, compiling the input into a machine-readable signature file comprising machine-readable logic representative of the network-exploit rule and a value of at least one field selected from the group consisting of an ENABLED field and a SEVERITY field, evaluating the machine-readable signature file, and determining the value of the at least one field of the machine-readable signature file is provided.
|
1. A node of a network for managing an intrusion protection system, the node comprising:
a memory module for storing data in machine-readable format for retrieval and execution by a central processing unit; and
an operating system comprising a network stack comprising a protocol driver and a media access control driver and operable to execute an intrusion protection system management application, the management application operable to receive text-file input from an input device, the text-file defining a network-exploit rule and comprising at least one field that includes information from which a determination is made as to whether an intrusion protection system evaluates the network-exploit rule.
2. The node according to
3. The node according to
4. The node according to
5. The node according to
6. The node according to
7. The node according to
8. The node according to
|
This patent application is related to co-pending U.S. patent application Ser. No. 10/001,501, entitled “METHOD AND COMPUTER READABLE MEDIUM FOR SUPPRESSING EXECUTION OF SIGNATURE FILE DIRECTIVES DURING A NETWORK EXPLOIT,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/001,431, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY CONDITION OF A COMPUTER SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/001,410, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY VULNERABILITIES OF A COMPUTER SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/002,695, entitled “SYSTEM AND METHOD OF DEFINING UNAUTHORIZED INTRUSIONS ON A COMPUTER SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/002,473, entitled “NETWORK INTRUSION DETECTION SYSTEM AND METHOD,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/001,445, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR INSERTING AN INTRUSION PREVENTION SYSTEM INTO A NETWORK STACK,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/003,815, entitled “METHOD, COMPUTER-READABLE MEDIUM, AND NODE FOR DETECTING EXPLOITS BASED ON AN INBOUND SIGNATURE OF THE EXPLOIT AND AN OUTBOUND SIGNATURE IN RESPONSE THERETO,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/001,446, entitled “NETWORK, METHOD AND COMPUTER READABLE MEDIUM FOR DISTRIBUTED SECURITY UPDATES TO SELECT NODES ON A NETWORK,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/003,747, entitled “METHOD, COMPUTER READABLE MEDIUM, AND NODE FOR A THREE-LAYERED INTRUSION PREVENTION SYSTEM FOR DETECTING NETWORK EXPLOITS,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/002,072, entitled “SYSTEM AND METHOD OF AN OS-INTEGRATED INTRUSION DETECTION AND ANTI-VIRUS SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/002,697, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR IDENTIFYING DATA IN A NETWORK EXPLOIT,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/003,819, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR PERFORMING MULTIPLE SIGNATURE MATCHING IN AN INTRUSION PREVENTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/002,694, entitled “USER INTERFACE FOR PRESENTING DATA FOR AN INTRUSION PROTECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/001,728, entitled “NODE AND MOBILE DEVICE FOR A MOBILE TELECOMMUNICATIONS NETWORK PROVIDING INTRUSION DETECTION,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/003,510, entitled “METHOD AND COMPUTER-READABLE MEDIUM FOR INTEGRATING A DECODE ENGINE WITH AN INTRUSION DETECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; U.S. patent application Ser. No. 10/002,064, entitled “SYSTEM AND METHOD OF GRAPHICALLY DISPLAYING DATA FOR AN INTRUSION PROTECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith; and U.S. patent application Ser. No. 10/001,350, entitled “SYSTEM AND METHOD OF GRAPHICALLY CORRELATING DATA FOR AN INTRUSION PROTECTION SYSTEM,” filed Oct. 31, 2001, co-assigned herewith.
This invention relates to network technologies and, more particularly, to a node, method, and computer readable medium for optimizing performance of signature rule matching in a network.
Network-exploit attack tools, such as denial-of-service (DoS) attack utilities, are becoming increasing sophisticated and, due to evolving technologies, simple to execute. Relatively unsophisticated attackers can arrange, or be involved in, computer system compromises directed at one or more targeted facilities. A network system attack (also referred to herein as an intrusion) is an unauthorized or malicious use of a computer or computer network and may involve hundred or thousands of unprotected, or alternatively compromised, Internet nodes together in a coordinated attack on one or more selected targets.
Network attack tools based on the client/server model have become a preferred mechanism for executing network attacks on targeted networks or devices. High capacity machines in networks having deficient security are often desired by attackers to launch distributed attacks therefrom. University servers typically feature high connectivity and capacity but relatively mediocre security. Such networks also often have inexperienced or overworked network administrators making them even more vulnerable for involvement in network attacks.
Network-exploit attack tools, comprising hostile attack applications such as denial-of-service utilities, responsible for transmitting data across a network medium will often have a distinctive “signature,” or recognizable pattern within the transmitted data. The signature may comprise a recognizable sequence of particular packets and/or recognizable data that is contained within one or more packets. Signature analysis is often performed by a network intrusion prevention system (IPS) and may be implemented as a pattern-matching algorithm and may comprise other signature recognition capabilities as well as higher-level application monitoring utilities. A simple signature analysis algorithm may search for a particular string that has been identified as associated with a hostile application. Once the string is identified within a network data stream, the one or more packets carrying the string may be identified as “hostile,” or exploitative, and the IPS may then perform any one or more of a number of actions, such as logging the identification of the frame, performing a countermeasure, or performing another data archiving or protection measure.
Intrusion prevention systems (IPS) encompass technology that attempts to identify exploits against a computer system or network of computer systems. Numerous types of IPSs exist and each are generally classified as either a network-based, host-based, or node-based IPS.
Network-based IPS appliances are typically dedicated systems placed at strategic places on a network to examine data packets to determine if they coincide with known attack signatures. To compare packets with known attack signatures, network-based IPS appliances utilize a mechanism referred to as passive protocol analysis to inconspicuously monitor, or “sniff,” all traffic on a network and to detect low-level events that may be discerned from raw network traffic. Network exploits may be detected by identifying patterns or other observable characteristics of network frames. Network-based IPS appliances examine the contents of data packets by parsing network frames and packets and analyzing individual packets based on the protocols used on the network. A network-based IPS appliance inconspicuously monitors network traffic inconspicuously, i.e., other network nodes may be, and often are, unaware of the presence of the network-based IPS appliance. Passive monitoring is normally performed by a network-based IPS appliance by implementation of a “promiscuous mode” access of a network interface device. A network interface device operating in promiscuous mode copies packets directly from the network media, such as a coaxial cable, 100baseT or other transmission medium, regardless of the destination node to which the packet is addressed. Accordingly, there is no simple method for transmitting data across the network transmission medium without the network-based IPS appliance examining it and thus the network-based IPS appliance may capture and analyze all network traffic to which it is exposed. Upon identification of a suspicious packet, i.e., a packet that has attributes corresponding to a known attack signature monitored for occurrence by the network-based IPS appliance, an alert may be generated thereby and transmitted to a management module of the IPS so that a networking expert may implement security measures. Network-based IPS appliances have the additional advantage of operating in real-time and thus can detect an attack as it is occurring. Moreover, a network-based IPS appliance is ideal for implementation of a state-based IPS security measure that requires accumulation and storage of identified suspicious packets of attacks that may not be identified “atomically,” that is by a single network packet. For example, transmission control protocol (TCP) synchronization (SYN) flood attacks are not identifiable by a single TCP SYN packet but rather are generally identified by accumulating a count of TCP SYN packets that exceed a predefined threshold over a defined period of time. A network-based IPS appliance is therefore an ideal platform for implementing state-based signature detection because the network-based IPS appliance may collect all such TCP SYN packets that pass over the local network media and thus may properly archive and analyze the frequency of such events.
However, network-based IPS appliances may often generate a large number of “false positives,” i.e., incorrect diagnoses of an attack. False positive diagnoses by network-based IPS appliances result, in part, due to errors generated during passive analysis of all the network traffic captured by the IPS that may be encrypted and formatted in any number of network supported protocols. Content scanning by a network-based IPS is not possible on an encrypted link although signature analysis based on protocol headers may be performed regardless of whether the link is encrypted or not. Additionally, network-based IPS appliances are often ineffective in high speed networks. As high speed networks become more commonplace, software-based network-based IPS appliances that attempt to sniff all packets on a link will become less reliable. Most critically, network-based IPS appliances can not prevent attacks unless integrated with, and operated in conjunction with, a firewall protection system.
Host-based IPSs detect intrusions by monitoring application layer data. Host-based IPSs employ intelligent agents to continuously review computer audit logs for suspicious activity and compare each change in the logs to a library of attack signatures or user profiles. Host-based IPSs may also poll key system files and executable files for unexpected changes. Host-based IPSs are referred to as such because the IPS utilities reside on the system to which they are assigned to protect. Host-based IPSs typically employ application-level monitoring techniques that examine application logs maintained by various applications. For example, a host-based IPS may monitor a database engine that logs failed access attempts and/or modifications to system configurations. Alerts may be provided to a management node upon identification of events read from the database log that have been identified as suspicious. Host-based IPSS, in general, generate very few false-positives. However, host-based IPS such as log-watchers are generally limited to identifying intrusions that have already taken place and are also limited to events occurring on the single host. Because log-watchers rely on monitoring of application logs, any damage resulting from the logged attack will generally have taken place by the time the attack has been identified by the IPS. Some host-based IPSs may perform intrusion-preventative functions such as ‘hooking’ or ‘intercepting’ operating system application programming interfaces to facilitate execution of preventative operations by an IPS based on application layer activity that appears to be intrusion-related. Because an intrusion detected in this manner has already bypassed any lower level IPS, a host-based IPS represents a last layer of defense against network exploits. However, host-based IPSs are of little use for detecting low-level network events such as protocol events.
Node-based IPSs apply the intrusion detection and/or prevention technology on the system being protected. An example of node-based IPS technologies is inline intrusion detection. A node-based IPS may be implemented at each node of the network that is desired to be protected. Inline IPSs comprise intrusion detection technologies embedded in the protocol stack of the protected network node. Because the inline IPS is embedded within the protocol stack, both inbound and outbound data will pass through, and be subject to monitoring by, the inline IPS. An inline IPS overcomes many of the inherent weaknesses of network-based solutions. As mentioned hereinabove, network-based solutions are generally ineffective when monitoring high-speed networks due to the fact that network-based solutions attempt to monitor all network traffic on a given link. Inline intrusion prevention systems, however, only monitor traffic directed to the node on which the inline IPS is installed. Thus, attack packets can not physically bypass an inline IPS on a targeted machine because the packet must pass through the protocol stack of the targeted device. Any bypassing of an inline IPS by an attack packet must be done entirely by ‘logically’ bypassing the IPS, i.e., an attack packet that evades an inline IPS must do so in a manner that causes the inline IPS to fail to identify, or improperly identify, the attack packet. Additionally, inline IPSs provide the hosting node with low-level monitoring and detection capabilities similar to that of a network IPS and may provide protocol analysis and signature matching or other low-level monitoring or filtering of host traffic. The most significant advantage offered by inline IPS technologies is that attacks are detected as they occur. Whereas host-based IPSs determine attacks by monitoring system logs, inline intrusion detection involves monitoring network traffic and isolating those packets that are determined to be part of an attack against the hosting server and thus enabling the inline IPS to actually prevent the attack from succeeding. When a packet is determine to be part of an attack, the inline IPS layer may discard the packet thus preventing the packet from reaching the upper layer of the protocol stack where damage may be caused by the attack packet—an effect that essentially creates a local firewall for the server hosting the inline IPS and protecting it from threats coming either from an external network, such as the Internet, or from within the network. Furthermore, the inline IPS layer may be embedded within the protocol stack at a layer where packets have been unencrypted so that the inline IPS is effective operating on a network with encrypted links. Additionally, inline IPSs can monitor outgoing traffic because both inbound and outbound traffic respectively destined to and originating from a server hosting the inline IPS must pass through the protocol stack.
Although the advantages of inline IPS technologies are numerous, there are drawbacks to implementing such a system. Inline intrusion detection is generally processor intensive and may adversely effect the node's performance hosting the detection utility. Additionally, inline IPSs may generate numerous false positive attack diagnoses. Furthermore, inline IPSs cannot detect systematic probing of a network, such as performed by reconnaissance attack utilities, because only traffic at the local server hosting the inline IPS is monitored thereby.
Each of network-based, host-based and inline-based IPS technologies have respective advantages as described above. Ideally, an intrusion prevention system will incorporate all of the aforementioned intrusion detection strategies. Additionally, an IPS may comprise one or more event generation mechanisms that report identifiable events to one or more management facilities. An event may comprise an identifiable series of system or network conditions or it may comprise a single identified condition. An IPS may also comprise an analysis mechanism or module and may analyze events generated by the one or more event generation mechanisms. A storage module may be comprised within an IPS for storing data associated with intrusion-related events. A countermeasure mechanism may also be comprised within the IPS for executing an action intended to thwart, or negate, a detected exploit.
IPS signature processing may be performed “inline” or “offline.” Frames are parsed and analyzed against known attack signatures as the frames are received by the network and/or node during inline processing. Because the signature analysis is executed in real time, that is as the frames are received, performance is critical because positive identifications may require proactive actions on the part of the IPS, such as signaling a management node, archiving of the subject frame, discarding of the subject frame, or performing another countermeasure. IPS systems that operate offline do not perform signature analysis of network frames in real-time. Rather, network frames are captured into a memory device and the recorded traffic is scanned for signature analysis at a later time. However, offline IPSs may benefit from performance optimization techniques that are implemented on inline based IPSs as well.
In accordance with an embodiment of the present invention, a node of a network for managing an intrusion protection system, the node comprising a memory module for storing data in machine-readable format for retrieval and execution by a central processing unit and an operating system comprising a network stack comprising a protocol driver and a media access control driver and operable to execute an intrusion protection system management application, the management application operable to receive text-file input from an input device, the text-file defining a network-exploit rule and comprising at least one field is provided.
In accordance with another embodiment of the present invention, a method of distributing command and security updates in a network having an intrusion protection system comprising generating a text-file defining a network-exploit rule and specifying at least one field selected from the group consisting of an ENABLED field value and a SEVERITY level field value during generation of the text-file is provided.
In accordance with yet another embodiment of the present invention, a computer-readable medium having stored thereon a set of instructions to be executed, the set of instructions, when executed by a processor, cause the processor to perform a computer method of reading input from an input device of the computer, compiling the input into a machine-readable signature file comprising machine-readable logic representative of the network-exploit rule and a value of at least one field selected from the group consisting of an ENABLED field and a SEVERITY field, evaluating the machine-readable signature file, and determining the value of the at least one field of the machine-readable signature file is provided.
For a more complete understanding of the present invention, the objects and advantages thereof, reference is now made to the following descriptions taken in connection with the accompanying drawings in which:
The preferred embodiment of the present invention and its advantages are best understood by referring to
In
In
In view of the above-noted deficiencies of network-based intrusion prevention systems, a hybrid host-based and node-based intrusion prevention system is preferably implemented within each of the various nodes, such as servers 270A-270N (also referred to herein as “nodes”), of Ethernet networks 55 and 56 in the secured network 100. Management node 85 may receive alerts from respective nodes within network 100 upon detection of an intrusion event by any one of the network-based IPS appliances 80 and 81 as well as any of the nodes of network 100 having a hybrid agent-based and node-based IPS implemented thereon. Additionally, each node 270A-270F may respectively employ a local file system for archiving intrusion-related events, generating intrusion-related reports, and storing signature files against which local network frames and/or packets are examined.
Preferably, network-based IPS appliances 80 and 81 are dedicated entities for monitoring network traffic on associated Ethernets 55 and 56 of network 100. To facilitate intrusion detection in high speed networks, network-based IPS appliances 80 and 81 preferably comprise a large capture RAM for capturing packets as they arrive on respective Ethernet networks 55 and 56. Additionally, it is preferable that network-based IPS appliances 80 and 81 respectively comprise hardware-based filters for filtering network traffic, although IPS filtering by network-based IPS appliances 80 and 81 may be implemented in software. Moreover, network-based IPS appliances 80 and 81 may be configured, for example by demand of IPS management node 85, to monitor one or more specific devices rather than all devices on a common network. For example, network-based IPS appliance 80 may be directed to monitor only network data traffic addressed to web server 270A.
Hybrid host-based/node-based intrusion prevention system technologies may be implemented on all nodes 270A-270N on Ethernet networks 55 and 56 that may be targeted by a network attack. In general, each node is comprised of a reprogrammable computer having a central processing unit (CPU), a memory module operable to store machine-readable code that is retrievable and executable by the CPU, and may further comprise various peripheral devices, such as a display monitor, a keyboard, a mouse or another device, connected thereto. A storage media, such as a magnetic disc, an optical disc or another component operable to store data, may be connected to memory module and accessible thereby and may provide one or more databases for archiving local intrusion events and intrusion event reports. An operating system may be loaded into memory module, for example upon bootup of the respective node, and comprises an instance of a protocol stack as well as various low-level software modules required for tasks such as interfacing to peripheral hardware, scheduling of tasks, allocation of storage as well as other system tasks. Each node protected by the hybrid host-based and node-based IPS of the present invention accordingly has an IPS software application maintained within the node, such as in a magnetic hard disc, that is retrievable by the operating system and executable by the central processing unit. Additionally, each node executing an instance of the IPS application has a local database from which signature descriptions of documented attacks may be fetched from storage and compared with a packet or frame of data to detect a correspondence therebetween. Detection of a correspondence between a packet or frame at an IDS server may result in execution of any one or more of various security procedures.
The IPS described with reference to
Each operating system of a node incorporating an instance of an IPS application additionally comprises a network protocol stack 90, as illustrated in
The capabilities of the host-based IPS comprise application monitoring of: file system events; registry access; successful security events; failed security events and suspicious process monitoring. Network access applications, such as Microsoft IIS and SQL Server, may also have processes related thereto monitored.
Intrusions may be prevented on a particular IPS host by implementation of inline, node-based monitoring technologies. The inline-IPS is preferably comprised as part of a hybrid host-based/node-based IPS although it may be implemented independently of any host-based IPS system. The inline-IPS will analyze packets received at the hosting node and perform signature analysis thereof against a database of known signatures by network layer filtering.
In
In
An operator of management node 85 may input one or more text-files 277A-277N via input device 281. Each text-file 277A-277N may define a network-based exploit and comprise a logical description of an attack signature as well as IPS directives to execute upon an IPS evaluation of an intrusion-related event associated with the described attack signature. Each text file 277A-277N may be stored in a database 278A on storage media 276 and compiled by a compiler 280 into a respective machine-readable signature file 281A-281N that is stored in a database 278B. Each of the machine-readable signature files 281A-281N comprises binary logic representative of the attack signature as described in the respectively associated text-file 277A-277N. An operator of management node 85 may periodically direct management node 85, through interaction with a client application of IPS application 279 via input device 281, to transmit one or more machine-readable signature files (also generally referred to herein as “signature files”) stored in database 278B to a node, or a plurality of nodes, in network 100. Alternatively, signature files 281A-281N may be stored on a computer-readable medium, such as a compact disk, magnetic floppy disk or another portable storage device, and installed on node 270 of network 100. Application 279 is preferably operable to transmit all such signature-files 281A-281N, or one or more subsets thereof, to a node, or a plurality of nodes, in network 100. Preferably, IPS application 279 provides a graphical user interface on output device 282 for facilitating input of commands thereto by an operator of node 85.
Optimization techniques for performance enhancement and reduction of memory requirements are particularly desirable when implemented in an IPS application that may perform real-time, processor-intensive network filtering. The present invention provides optimization techniques that allow restricting the number of signatures that a network IPS application and/or a network node-based IPS appliance has to process. Preferably, such optimization techniques are made prior to initialization of a signature matching engine of an IPS application 91 and prior to modifications made to the set of signatures against which network traffic is compared.
As aforementioned, attack signatures may be defined in text-files and computer-readable signature files generated therefrom may be distributed throughout a network 100 and stored in a database 277 accessible by each node 270 of network 100 running an instance of IPS application 91. Database 277 storing one or more machine-readable signature files may be fed to an instance of IPS application 91 executed by CPU 272 and network frame analysis may be performed by an associative process engine of IPS 91. IPS application 91 may then inspect inbound and/or outbound network traffic against one or more signature files maintained in database 277. Each signature file maintained in database 277 is preferably generated from compilation of a text-file and may also define one or more actions, or directives, to be performed upon identification of a correspondence between a signature of an analyzed packet and a respective machine-readable signature-file. For example, a text-file defining a network exploit may specify a particular security measure, such as specifying that the identified packet is to be discarded, reported to management node 85, archived, or that another security measure is to be executed, and the corresponding machine-readable signature-file generated therefrom may comprise machine-readable instructions directing IPS application 91 to perform the specified security measure.
Preferably, text-file 277A comprised of a text-based network exploit rule defines an exploit-signature and allows an operator or other network 100 personnel operating management node 85 to set a security policy associated with a particular signature by specifying a security policy in text-file 277A. A basic optimization may comprise simply enabling or disabling enforcement of intrusion prevention of the signature defined in text-file 277A by specifying a value in an enable/disable field of text-file 277A, such as specifying a boolean value or an otherwise asserted or de-asserted value thereto. Additional optimizations may allow various levels of specified priority levels to be assigned to each of the defined network exploit rules in a priority, or severity, field. Implementation of signature matching may then be restricted to a specific priority level and/or to any signatures meeting or exceeding a particular priority level. Thus, the enable/disable field of a network exploit rule defined in text-file 277A, as well as the priority level field, may be used to generate a subset of all signature descriptions to be distributed throughout network 100 protected by the IPS. Accordingly, the number of network exploit rules scanned by IPS application 91 may be periodically varied by, for example, a network manager operating management node 85.
Additional filtering may be performed to further enhance signature analysis of network frames performed by a network-based, node-based, and/or a host-based IPS server. For example, a particular node (comprising a network-based IPS appliance) may be configured to only filter network traffic on a particular set of protocols. Signatures maintained in database 277 and generated from text-file 277A defining a protocol-specific attack not comprised within the particular set of protocols may then be ignored or discarded by IPS 91. Similarly, all network nodes may comprise default protocols that are not filtered if, for example, network 100 does not allow data transmissions in the particular protocol. Accordingly, signature descriptions of attacks made in a protocol that is inapplicable to network 100 transmissions may be discarded, or otherwise ignored, by all instances of IPS 91 running on nodes within network 100. Other optimization techniques are possible as described with reference to co-pending application Ser. No. [10/002,019].
In TABLE A, there is an exemplary portion of a text-based attack signature description that may be defined in text-file 277A and that comprises enablement and priority attributes therein from which compilation thereof by compiler 280 may generate a machine-readable signature-file and associated enablement and priority attribute logic. The particular portion of the signature description shown describes an attack known as ‘Ping of Death.’
TABLE A
BEGIN_SECURITY_DEF: PingofDeath
PLATFORM:ALL
ENABLED:1
BRIEF_DESCRIPTION: ’DETECT PING OF DEATH'
EXPLANATION:’The Ping of Death attack exploits a flaw in the TCP/IP
stack implementation in which the TCP/IP stack does not validate the total
length of the IP frame.'
SEVERITY:2
As shown, an ENABLED field is comprised in the text-based description that may be comprised in text-file 277A. In the present example, the ENABLED field has an asserted value of 1 indicating that intrusion protection from an attack having a signature corresponding to the machine-readable signature-file generated from the described text-file is to be enabled by IPS application 91. The ENABLED field may alternatively be de-asserted, for example assigned a value of 0, to disable protection by any node of network 100 running IPS application 91 and receiving a machine-readable signature-file generated from associated text-file 277A.
Additionally, the text-based signature description may further comprise a priority, or SEVERITY, field that may have a numerical value assigned thereto and that specifies a priority value for intrusion protection from an attack having a signature that corresponds to a machine-readable signature-file generated from compilation of the text-file. The exemplary attack signature has a SEVERITY field value of 2 assigned thereto. Thus, a threshold may be supplied to IPS application 91 and any machine-readable signature files generated from respective text-files 277A-277N having a SEVERITY less than the specified threshold may be ignored by IPS application 91. Accordingly, only machine-readable signatures having SEVERITY values equal to or greater than a specified threshold are retrieved from database 277 and utilized for signature analysis of network frames by IPS application 91.
With reference again to
Alternatively, machine-readable signature-files may be distributed to one or more nodes of network 100 generated from text-files having an ENABLED and/or SEVERITY field and respective values assigned thereto. The machine-readable signature-files may be stored in database 277 and enablement and/or severity value specifications, or thresholds, may be supplied to IPS application 91. IPS application 91 may then retrieve only machine-readable signature-files from database 277 that have been generated from text-files having a ENABLED and/or SEVERITY field value that satisfies the enablement and/or severity value specifications supplied to IPS application 91. Supply of an enablement and/or a severity specification to IPS application 91 may be performed locally at the respective node running IPS application 91, for example through a peripheral input device, or the enablement and/or severity specification may be supplied to the node remotely, for example via management node 85 engaging in a TCP session with the node.
Thus, the present invention provides a mechanism for optimizing the set of machine-readable signatures that are used in frame and packet analysis performed by an IPS application by reducing the number of signature files that are checked by a processing engine of an IPS. Potential processing problems related to a large quantity of machine-readable signature files that must be processed by an IPS are accordingly alleviated by the optimization technique of the present invention.
Tarquini, Richard Paul, Schertz, Richard Louis
Patent | Priority | Assignee | Title |
8887281, | Jan 25 2002 | The Trustees of Columbia University in the City of New York | System and methods for adaptive model generation for detecting intrusion in computer systems |
8893273, | Jan 25 2002 | The Trustees of Columbia University in the City of New York | Systems and methods for adaptive model generation for detecting intrusions in computer systems |
8931094, | Aug 16 2001 | The Trustees of Columbia University in the City of New York | System and methods for detecting malicious email transmission |
9306966, | Dec 14 2001 | The Trustees of Columbia University in the City of New York | Methods of unsupervised anomaly detection using a geometric framework |
9450979, | Oct 30 2006 | The Trustees of Columbia University in the City of New York | Methods, media, and systems for detecting an anomalous sequence of function calls |
9497203, | Jan 25 2002 | The Trustees of Columbia University in the City of New York | System and methods for adaptive model generation for detecting intrusion in computer systems |
Patent | Priority | Assignee | Title |
5557742, | Mar 07 1994 | McAfee Inc | Method and system for detecting intrusion into and misuse of a data processing system |
5987611, | Dec 31 1996 | CHECK POINT SOFTWARE TECHNOLOGIES, INC | System and methodology for managing internet access on a per application basis for client computers connected to the internet |
6134664, | Jul 06 1998 | Northrop Grumman Systems Corporation | Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources |
6279113, | Mar 16 1998 | GEN DIGITAL INC | Dynamic signature inspection-based network intrusion detection |
6381632, | Sep 10 1996 | YOUpowered, Inc. | Method and apparatus for tracking network usage |
6477651, | Jan 08 1999 | Cisco Technology, Inc | Intrusion detection system and method having dynamically loaded signatures |
6578147, | Jan 15 1999 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks |
6631473, | Aug 05 1998 | Sun Microsystems, Inc. | Adaptive countermeasure selection method and apparatus |
6728885, | Oct 09 1998 | McAfee, Inc | System and method for network access control using adaptive proxies |
7085936, | Aug 30 1999 | Symantec Corporation | System and method for using login correlations to detect intrusions |
7116663, | Jul 20 2001 | MICROSEMI STORAGE SOLUTIONS, INC | Multi-field classification using enhanced masked matching |
20020078381, | |||
20030004689, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 26 2001 | SCHERTZ, RICHARD LOUIS | Hewlett-Packard Company | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012705 | /0880 | |
Oct 29 2001 | TARQUINI, RICHARD PAUL | Hewlett-Packard Company | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 012705 | /0880 | |
Oct 31 2001 | Hewlett-Packard Development Company, L.P. | (assignment on the face of the patent) | / | |||
Sep 26 2003 | Hewlett-Packard Company | HEWLETT-PACKARD DEVELOPMENT COMPANY L P | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 014061 | /0492 | |
Oct 02 2015 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Hewlett Packard Enterprise Development LP | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 036987 | /0001 | |
Oct 27 2015 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Hewlett Packard Enterprise Development LP | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037079 | /0001 | |
Mar 08 2016 | Hewlett Packard Enterprise Development LP | TREND MICRO INCORPORATED | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 039203 | /0047 | |
Apr 14 2016 | TREND MICRO INCORPORATED | TREND MICRO INCORPORATED | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 039512 | /0945 |
Date | Maintenance Fee Events |
Jun 27 2014 | REM: Maintenance Fee Reminder Mailed. |
Aug 28 2014 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 28 2014 | M1554: Surcharge for Late Payment, Large Entity. |
Apr 16 2018 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
May 16 2022 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Nov 16 2013 | 4 years fee payment window open |
May 16 2014 | 6 months grace period start (w surcharge) |
Nov 16 2014 | patent expiry (for year 4) |
Nov 16 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 16 2017 | 8 years fee payment window open |
May 16 2018 | 6 months grace period start (w surcharge) |
Nov 16 2018 | patent expiry (for year 8) |
Nov 16 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 16 2021 | 12 years fee payment window open |
May 16 2022 | 6 months grace period start (w surcharge) |
Nov 16 2022 | patent expiry (for year 12) |
Nov 16 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |